// For flags

CVE-2024-39682

WordPress Cooked Plugin - Authenticated (Contributor+) HTML Injection via Recipe Excerpt

Severity Score

6.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to HTML Injection in versions up to, and including, 1.7.15.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level access and above to inject arbitrary HTML in pages that will be shown whenever a user accesses a compromised page. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Cooked es un complemento de recetas para WordPress. El complemento Cooked para WordPress es vulnerable a la inyección de HTML en versiones hasta la 1.7.15.4 incluida debido a una sanitización de entrada y un escape de salida insuficientes. Esta vulnerabilidad permite a atacantes autenticados con acceso de nivel de colaborador y superior inyectar HTML arbitrario en páginas que se mostrarán cada vez que un usuario acceda a una página comprometida. Este problema se solucionó en la versión 1.8.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad.

The Cooked – Recipe Management plugin for WordPress is vulnerable to HTML Injection in all versions up to, and including, 1.7.15.4. This is due to the plugin not properly escaping/validating input to _recipe_settings. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary HTML in a field that should not allow it.

*Credits: RE-ALTER
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-06-27 CVE Reserved
  • 2024-07-17 CVE Published
  • 2024-07-18 EPSS Updated
  • 2024-08-09 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-116: Improper Encoding or Escaping of Output
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
XjSv
Search vendor "XjSv"
Cooked
Search vendor "XjSv" for product "Cooked"
< 1.8.0
Search vendor "XjSv" for product "Cooked" and version " < 1.8.0"
en
Affected